1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
12

Arrange the Jumbled letters 1.eilf ngrihsa ________________ 2.cersityu ourreecs ________________ 3. ngrihsa ________________ 4.

mmocnoitacin ________________ 5. exiflble ecscsa
Computers and Technology
1 answer:
Alisiya [41]3 years ago
5 0

Answer:

1. file sharing

2. security recourse

3.sharing

4.communication

5.flexible access

Explanation:

-

You might be interested in
What do we call stores in a physical world?
djyliett [7]

Answer:

brick and mortar stores i believe

6 0
3 years ago
Did batman die in endgame? I dont have enough money to see the movie can you tell me what happens. It said batman died from some
kotykmax [81]

Answer: The Marvel batman, otherwise known as Iron Man did.

Explanation: Movie was pretty good.

5 0
3 years ago
What is the result of a network technician issuing the command ip dhcp excluded-address 10. 0. 15. 1 10. 0. 15. 15 on a cisco ro
Hunter-Best [27]
The answer to this question is 83774838473773
3 0
2 years ago
Componets of computer
Temka [501]

The four components of computer are explained clearly.

<u>Explanation:</u>

  • Hardware is the electrical physical parts that a computer system needs to function. It organizes all the process  by a circuit board that operates within a PC or laptop; built with the "motherboard", "graphics card", "CPU (Central Processing Unit)", "ventilation fans", "webcam", "power supply", and so on. Without hardware, there is no means of running the necessary software that makes computers so valuable.
  • Software is a program that facilitates a computer to execute a particular task, as objected to the hardware. Computer software has to be "stored" into the computer's storage (such as a hard drive, memory, or RAM). Working computer systems segment software into three major classes: system software, programming software, and application software.
  • A user is a person who handles a computer or network service. Users of computer and software output regularly require the technical expertise needed to fully know how they operate.
  • Data is defined as bases or figures, or knowledge that's saved in or utilized by a computer. This data will be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be prepared by the CPU and are saved in files and folders on the hard disk.
3 0
4 years ago
Because __________ software can block suspicious software in real-time, it has an advantage over such established anti-virus det
shutvik [7]

Because dynamic analysis software can block suspicious software in real-time, it has an advantage over such established anti-virus detection techniques as fingerprinting or heuristics.

<h3>What is dynamic program analysis?</h3>
  • The examination of computer software by means of the execution of programs on a physical or virtual processor is known as dynamic program analysis.
  • Effective dynamic program analysis requires running the target program with enough test inputs to account for almost all potential outputs.
  • Utilizing software testing tools like code coverage increases the likelihood that a sufficient sampling of the program's potential behaviors has been seen.
  • Additionally, it is important to take precautions to reduce the impact that instrumentation has on the target program's execution, especially its temporal characteristics.
  • Static program analysis contrasts with dynamic analysis. Dynamic testing is used in unit tests, integration tests, system tests, and acceptance tests.

To learn more about the topic, refer to the following link:

brainly.com/question/17209742

#SPJ4

8 0
2 years ago
Other questions:
  • What is wrong with the following declaration? How should it be fixed?
    11·1 answer
  • Write a short program that uses a for loop to populate an array. The array can store up to 10 integers. Modify the code slightly
    12·1 answer
  • Select the correct answer. Which of these statements is an explorer most likely to make?​
    6·1 answer
  • Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick
    10·1 answer
  • These icons cannot be removed from the Dock. Finder e-mail music player Trash
    14·1 answer
  • Select the correct answer.
    5·1 answer
  • Define foreign key. What is this concept used for?
    6·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
  • Who made the game Monopoly???
    10·2 answers
  • Adding a border to an image is one way to manipulate media to spice up a project. Where do you find the Picture Styles command t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!